masked-kyber-m4 / mkm4
This is the repository for the first-order masked Kyber on ARM Cortex-M4
☆10Updated last year
Alternatives and similar repositories for mkm4:
Users that are interested in mkm4 are comparing it to the libraries listed below
- MLKEM implementation optimized for embedded microcontrollers☆15Updated 5 months ago
- ☆10Updated last year
- ☆16Updated 4 years ago
- ☆53Updated 7 months ago
- High-assurance, high-performance C90 implementation of ML-KEM☆28Updated this week
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆31Updated 4 years ago
- Saber and NTRU on M4 and AVX2☆16Updated 3 years ago
- A bitsliced implementation of ECB and CTR AES☆47Updated 5 months ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆29Updated 5 months ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆34Updated last year
- ☆19Updated 2 months ago
- Fast constant-time AES implementations on 32-bit architectures☆63Updated 3 months ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- Security Estimation Scripts for Kyber and Dilithium☆29Updated 3 years ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆56Updated last month
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆26Updated 7 years ago
- ☆17Updated 4 months ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆39Updated last year
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆29Updated 5 months ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆33Updated 2 weeks ago
- Tool to automatically search for linear characteristics☆39Updated 9 years ago
- A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.☆28Updated 2 months ago
- High-order countermeasures for AES and DES☆25Updated 5 months ago
- Masked Ascon Software Implementations☆11Updated 2 years ago
- ☆13Updated 3 months ago
- ☆10Updated last year
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆66Updated last month
- ☆46Updated 8 months ago